Skip to main content

Minimising K-Dominating Set in Arbitrary Network Graphs

  • Conference paper
Advanced Data Mining and Applications (ADMA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8347))

Included in the following conference series:

Abstract

A self-stabilizing algorithm, after transient faults hit the system and place it in some arbitrary global state, recovers in finite time without external (e.g., human) intervention. A k-dominating set in a distributed system is a set of processors such that each processor outside the set has at least k neighbors in the set. In the past, a few self-stabilizing algorithms for minimal k-dominating set (MKDS) have been obtained. However, the presented self-stabilizing algorithms for MKDS work for either trees or a minimal 2-dominating set. Recently a self-stabilizing algorithm for MKDS in arbitrary graphs under a central daemon has been investigated. But so far, there is no algorithm for the MKDS problem in arbitrary graphs that works under a distributed daemon. In this paper, we propose a self-stabilizing algorithm for finding a MKDS under a distributed daemon model when operating in any general network graph. We further verify the correctness of the proposed algorithm (Algorithm MKDS) and prove that the worst case convergence time of the algorithm from any arbitrary initial state is O(n 2) steps where n is the number of nodes in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Datta, A.K., Larmore, L.L., Devismes, S., Heurtefeux, K., Rivierre, Y.: Self-stabilizing small k-dominating sets. International Journal of Networking and Computing 3(1), 116–136 (2013)

    Google Scholar 

  2. Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control. ACM. Commun. 17(11), 643–644 (1974)

    Article  MATH  Google Scholar 

  3. Dijkstra, E.W.: A simple fixpoint argument without the restriction to continuity. Acta. Inf. 23(1), 1–7 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  4. Dolev, S.: Self-Stabilization. MIT Press, Cambridge (2000)

    MATH  Google Scholar 

  5. Gairing, M., Hedetniemi, S.T., Kristiansen, P., McRae, A.A.: Self-stabilizing algorithms for {k}-domination. In: Huang, S.-T., Herman, T. (eds.) SSS 2003. LNCS, vol. 2704, pp. 49–60. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York (1979)

    MATH  Google Scholar 

  7. Goddard, W., Hedetniemi, S.T., Jacobs, D.P., Srimani, P.K.: A self-stabilizing distributed algorithm for minimal total domination in an arbitrary system graph. In: 17th International Symposium on Parallel and Distributed Processing, pp. 485–488. IEEE Press, Nice (2003)

    Google Scholar 

  8. Goddard, W., Hedetniemi, S.T., Jacobs, D.P., Srimani, P.K., Xu, Z.: Self-stabilizing graph protocols. Parallel Processing Letters 18(1), 189–199 (2008)

    Article  MathSciNet  Google Scholar 

  9. Guellati, N., Kheddouci, H.: A survey on self-stabilizing algorithms for independence, domination, coloring, and matching in graphs. Journal of Parallel and Distributed Computing 70(4), 406–415 (2010)

    Article  MATH  Google Scholar 

  10. Hedetniemi, S.M., Hedetniemi, S.T., Kennedy, K.E., McRae, A.A.: Self-stabilizing algorithms for unfriendly partitions into two disjoint dominating sets. Parallel Processing Letters 23(1) (2013)

    Google Scholar 

  11. Hedetniemi, S.M., Hedetniemi, S.T., Jacobs, D.P., Srimani, P.K.: Self-stabilizing algorithms for minimal dominating sets and maximal independent sets. Computer Mathematics and Applications 46(5-6), 805–811 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  12. Hedetniemi, S.T., Jacobs, D.P., Srimani, P.K.: Linear time self-stabilizing colorings. Information Processing Letters 87(5), 251–255 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  13. Huang, T.C., Chen, C.Y., Wang, C.P.: A linear-time self-stabilizing algorithm for the minimal 2-dominating set problem in general networks. Inf. Sci. Eng. 24(1), 175–187 (2008)

    MathSciNet  Google Scholar 

  14. Huang, T.C., Lin, J.C., Chen, C.Y., Wang, C.P.: A self-stabilizing algorithm for finding a minimal 2-dominating set assuming the distributed daemon model. Computers and Mathematics with Applications 54(3), 350–356 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  15. Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407–430 (2011)

    Article  Google Scholar 

  16. Kamei, S., Kakugawa, H.: A self-stabilizing algorithm for the distributed minimal k-redundant dominating set problem in tree network. In: 4th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 720–724. IEEE Press, Chengdu (2003)

    Google Scholar 

  17. Kim, D., Zhang, Z., Li, X., Wang, W., Wu, W., Du, D.: A Better Approximation Algorithm for Computing Connected Dominating Sets in Unit Ball Graphs. IEEE Trans. Mob. Comput. 9(8), 1108–1118 (2010)

    Article  Google Scholar 

  18. Lana, J.K., Changa, G.J.: Algorithmic aspects of the k-domination problem in graphs. Discrete Applied Mathematics 161(10-11), 1513–1520 (2013)

    Article  MathSciNet  Google Scholar 

  19. Manne, F., Mjelde, M., Pilard, L., Tixeuil, S.: A new self-stabilizing maximal matching algorithm. Theoretical Computer Science 410(14), 1336–1345 (2008)

    Article  MathSciNet  Google Scholar 

  20. Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying Privacy Requirements Before Data Anonymization. Comput. 55(4), 422–437 (2012)

    Google Scholar 

  21. Thai, M.T., Wang, F., Liu, D., Zhu, S., Du, D.: Connected dominating sets in wireless networks with different transmission ranges. IEEE Trans. Mob. Comput. 6(7), 721–730 (2007)

    Article  Google Scholar 

  22. Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Transactions on Knowledge and Data Engineering 21(6), 840–853 (2009)

    Article  Google Scholar 

  23. Wang, G., Wang, H., Tao, X., Zhang, J.: A self-stabilizing algorithm for finding a minimal K-dominating set in general networks. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds.) ICDKE 2012. LNCS, vol. 7696, pp. 74–85. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  24. Yong, J., Bertion, E.: Replacing Lost or Stolen E-Passports. IEEE Computer 40(10), 89–91 (2007)

    Article  Google Scholar 

  25. Yong, J., Shen, W., Yang, Y.: Special Issue on Computer-Supported Cooperative Work: Techniques and applications. Inf. Sci. 179(15), 2513–2514 (2009)

    Article  Google Scholar 

  26. Yong, J., Yan, J., Huang, X.: WFMS-based Data Integration for e-Learning. In: 10th International Conference on CSCW in Design, pp. 1361–1366. IEEE, Nanjing (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, G., Wang, H., Tao, X., Zhang, J., Zhang, J. (2013). Minimising K-Dominating Set in Arbitrary Network Graphs. In: Motoda, H., Wu, Z., Cao, L., Zaiane, O., Yao, M., Wang, W. (eds) Advanced Data Mining and Applications. ADMA 2013. Lecture Notes in Computer Science(), vol 8347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-53917-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-53917-6_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-53916-9

  • Online ISBN: 978-3-642-53917-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics